Improving the information security model by using TFI